Frequency Hopping Technique in Industrial Wireless Sensor ...

34
sensors Article A Method for Dynamically Selecting the Best Frequency Hopping Technique in Industrial Wireless Sensor Network Applications Erlantz Fernández de Gorostiza 1, *, Jorge Berzosa 1 ID , Jon Mabe 1 and Roberto Cortiñas 2 ID 1 Electronics and Communications Unit, IK4-Tekniker, Calle Iñaki Goenaga 5, 20600 Eibar, Spain; [email protected] (J.B.); [email protected] (J.M.) 2 Computer Science Faculty, University of the Basque Country UPV/EHU, Paseo M. Lardizábal 1, 20018 Donostia-San Sebastián, Spain; [email protected] * Correspondence: [email protected]; Tel.: +34-943-20-6744 Received: 29 December 2017; Accepted: 20 February 2018; Published: 23 February 2018 Abstract: Industrial wireless applications often share the communication channel with other wireless technologies and communication protocols. This coexistence produces interferences and transmission errors which require appropriate mechanisms to manage retransmissions. Nevertheless, these mechanisms increase the network latency and overhead due to the retransmissions. Thus, the loss of data packets and the measures to handle them produce an undesirable drop in the QoS and hinder the overall robustness and energy efficiency of the network. Interference avoidance mechanisms, such as frequency hopping techniques, reduce the need for retransmissions due to interferences but they are often tailored to specific scenarios and are not easily adapted to other use cases. On the other hand, the total absence of interference avoidance mechanisms introduces a security risk because the communication channel may be intentionally attacked and interfered with to hinder or totally block it. In this paper we propose a method for supporting the design of communication solutions under dynamic channel interference conditions and we implement dynamic management policies for frequency hopping technique and channel selection at runtime. The method considers several standard frequency hopping techniques and quality metrics, and the quality and status of the available frequency channels to propose the best combined solution to minimize the side effects of interferences. A simulation tool has been developed and used in this work to validate the method. Keywords: wireless sensor networks; robustness; coexistence mechanisms; interference avoidance; security; frequency hopping; channel characterization 1. Introduction Wireless Sensor Networks (WSN) are one of the industrial applications that benefit the most from the license-free nature of the Industrial, Scientific and Medical (ISM) band. Nevertheless, the ISM band has to be shared with other devices and systems using standard communication protocols such as Wireless Local Area Network (WLAN) or Bluetooth [1]. This situation leads to interferences in the communication channel and, as a result, produces (pseudo-) random transmission errors. Re-transmitting interfered packets might eventually succeed, but at the expense of increased latency and energy consumption of the devices. Lost packets and increased latency directly affect the QoS of the network, first by the direct loss of arbitrary packets and second by the side effects of the missed packets such as breaking a multi message or state-full process that has to be started from the beginning (i.e., pairing, network establishment, discovery, etc.) [2]. Sensors 2018, 18, 657; doi:10.3390/s18020657 www.mdpi.com/journal/sensors

Transcript of Frequency Hopping Technique in Industrial Wireless Sensor ...

sensors

Article

A Method for Dynamically Selecting the BestFrequency Hopping Technique in Industrial WirelessSensor Network Applications

Erlantz Fernández de Gorostiza 1,*, Jorge Berzosa 1 ID , Jon Mabe 1 and Roberto Cortiñas 2 ID

1 Electronics and Communications Unit, IK4-Tekniker, Calle Iñaki Goenaga 5, 20600 Eibar, Spain;[email protected] (J.B.); [email protected] (J.M.)

2 Computer Science Faculty, University of the Basque Country UPV/EHU, Paseo M. Lardizábal 1,20018 Donostia-San Sebastián, Spain; [email protected]

* Correspondence: [email protected]; Tel.: +34-943-20-6744

Received: 29 December 2017; Accepted: 20 February 2018; Published: 23 February 2018

Abstract: Industrial wireless applications often share the communication channel with other wirelesstechnologies and communication protocols. This coexistence produces interferences and transmissionerrors which require appropriate mechanisms to manage retransmissions. Nevertheless, thesemechanisms increase the network latency and overhead due to the retransmissions. Thus, the loss ofdata packets and the measures to handle them produce an undesirable drop in the QoS and hinderthe overall robustness and energy efficiency of the network. Interference avoidance mechanisms,such as frequency hopping techniques, reduce the need for retransmissions due to interferences butthey are often tailored to specific scenarios and are not easily adapted to other use cases. On the otherhand, the total absence of interference avoidance mechanisms introduces a security risk becausethe communication channel may be intentionally attacked and interfered with to hinder or totallyblock it. In this paper we propose a method for supporting the design of communication solutionsunder dynamic channel interference conditions and we implement dynamic management policiesfor frequency hopping technique and channel selection at runtime. The method considers severalstandard frequency hopping techniques and quality metrics, and the quality and status of theavailable frequency channels to propose the best combined solution to minimize the side effects ofinterferences. A simulation tool has been developed and used in this work to validate the method.

Keywords: wireless sensor networks; robustness; coexistence mechanisms; interference avoidance;security; frequency hopping; channel characterization

1. Introduction

Wireless Sensor Networks (WSN) are one of the industrial applications that benefit the most fromthe license-free nature of the Industrial, Scientific and Medical (ISM) band. Nevertheless, the ISMband has to be shared with other devices and systems using standard communication protocolssuch as Wireless Local Area Network (WLAN) or Bluetooth [1]. This situation leads to interferencesin the communication channel and, as a result, produces (pseudo-) random transmission errors.Re-transmitting interfered packets might eventually succeed, but at the expense of increased latencyand energy consumption of the devices.

Lost packets and increased latency directly affect the QoS of the network, first by the direct loss ofarbitrary packets and second by the side effects of the missed packets such as breaking a multi messageor state-full process that has to be started from the beginning (i.e., pairing, network establishment,discovery, etc.) [2].

Sensors 2018, 18, 657; doi:10.3390/s18020657 www.mdpi.com/journal/sensors

Sensors 2018, 18, 657 2 of 34

Additionally, not all interferences are unintentionally produced by coexisting networks. Externalattackers may try to block the communication channel in order to perform a Denial of Service (DoS) [3]attack. DoS security attacks are specifically designed for interfering with the communication link,either hindering or totally blocking the communication channel. Thus, communication protocols thatdo not appropriately manage the communication channel may not be able to provide a satisfactorysecurity level.

All in all, interference avoidance mechanisms that reduce the need for retransmissions are highlydesired in WSN domains in order to minimize energy consumption, reduce unnecessary degradationof QoS and reliability as well as to raise security.

In this paper we present a method for supporting the design of communication solutions forsaturated and dynamic environments from the point of view of channel interference. This methodcharacterizes frequency hopping techniques based on the quality of the available frequency channels.Frequency hopping techniques relay on the use of multiple frequency channels over time as opposedto statically allocating and using a single frequency channel. The main idea is that, in case of channelinterference, frequency hopping helps in minimizing the side effects by avoiding (at least temporally)the interfered frequency. Figure 1 shows a frequency hopping schedule example in which multiplefrequency channels are selected at different time instants.

Sensors 2017, 17, x FOR PEER REVIEW 2 of 33

Additionally, not all interferences are unintentionally produced by coexisting networks. External attackers may try to block the communication channel in order to perform a Denial of Service (DoS) [3] attack. DoS security attacks are specifically designed for interfering with the communication link, either hindering or totally blocking the communication channel. Thus, communication protocols that do not appropriately manage the communication channel may not be able to provide a satisfactory security level.

All in all, interference avoidance mechanisms that reduce the need for retransmissions are highly desired in WSN domains in order to minimize energy consumption, reduce unnecessary degradation of QoS and reliability as well as to raise security.

In this paper we present a method for supporting the design of communication solutions for saturated and dynamic environments from the point of view of channel interference. This method characterizes frequency hopping techniques based on the quality of the available frequency channels. Frequency hopping techniques relay on the use of multiple frequency channels over time as opposed to statically allocating and using a single frequency channel. The main idea is that, in case of channel interference, frequency hopping helps in minimizing the side effects by avoiding (at least temporally) the interfered frequency. Figure 1 shows a frequency hopping schedule example in which multiple frequency channels are selected at different time instants.

Figure 1. Example of a Frequency Hopping schedule.

The core of the method is based on several standard frequency hopping techniques as well as quality metrics for the characterization of available and valid frequency channels. The proposed method homogenizes the notation used to describe the different techniques and normalizes the different quality metrics based on the statistical properties of the RSSI values. Thanks to the homogenization and normalization, the different techniques can be fairly compared based on quality and performance indicators. Additionally, the method is flexible enough to accommodate new frequency hopping techniques, quality metrics and performance indicator approaches. Thus, it is scalable and extensible with new additions.

All the techniques and metrics are combined into a two-dimensional matrix. Each technique and metric pair represents a possible solution which provides a subset of selected or preferred channels and the sequence in which the channels are used. For some techniques, this sequence is purely random while for others the sequence will change based on specific parameters. For instance, in techniques based on probabilistic channel usage, there are channels within the subset which are used more often because they are considered to be of “better” quality. On the other hand, and regarding quality metrics, some metrics are better suited for characterizing static interferences while others are better used for dynamic interferences that hop between channels.

Figure 1. Example of a Frequency Hopping schedule.

The core of the method is based on several standard frequency hopping techniques as wellas quality metrics for the characterization of available and valid frequency channels. The proposedmethod homogenizes the notation used to describe the different techniques and normalizes the differentquality metrics based on the statistical properties of the RSSI values. Thanks to the homogenizationand normalization, the different techniques can be fairly compared based on quality and performanceindicators. Additionally, the method is flexible enough to accommodate new frequency hoppingtechniques, quality metrics and performance indicator approaches. Thus, it is scalable and extensiblewith new additions.

All the techniques and metrics are combined into a two-dimensional matrix. Each technique andmetric pair represents a possible solution which provides a subset of selected or preferred channelsand the sequence in which the channels are used. For some techniques, this sequence is purely randomwhile for others the sequence will change based on specific parameters. For instance, in techniquesbased on probabilistic channel usage, there are channels within the subset which are used more oftenbecause they are considered to be of “better” quality. On the other hand, and regarding quality metrics,

Sensors 2018, 18, 657 3 of 34

some metrics are better suited for characterizing static interferences while others are better used fordynamic interferences that hop between channels.

All the solutions from the matrix are compared to determine the best one: the solution that resultsin the fewer number of interferences for the given interference range, either produced by coexistingnetworks or by external factors (such as malicious attacks).

The proposed method can be used in two complementary scenarios: (a) as a deployment planningsupporting tool in order to decide on the best frequency channels, channel quality metrics andfrequency hopping techniques and (b) as a runtime management component for the dynamic allocationof communication frequency channel. In the former case, a network topology can be planned basedon the frequency channel subset, channel hop sequence and the number of hops of each node to thegateway. In the latter case, the management component can be implemented into a device which willmonitor the quality of the environment using the selected quality metric and dynamically adapt to theenvironment conditions by switching to the most suitable frequency hopping technique. Additionally,the method can also take into account the characteristics of constrained systems (either computationallyor energetically) in order to select the most suitable solution.

To the best knowledge of the authors, this is the first attempt to define a method that homogenizes,combines and compares several frequency-hopping techniques for network deployment and real-timeadaptation. As will be shown in Section 3, current approaches compare either different frequencyhopping techniques or characterization metrics, but no common comparison is made to specifythe best solution taking into account frequency channel quality behaviour and its evolution overtime. No technique found in the SoTA adapts the frequency hopping technique dynamically to theenvironment conditions. Several frequency hopping techniques are analysed, but their use is notmodified at run time (nor the quality metric) if the interferences pattern (and frequency channel quality)changes in the medium-long term.

This paper only considers the theoretic validation of the proposed method in simulated scenarios.The method has been implemented as a Matlab tool, which has been used in this work for testing andvalidation purposes. The validation considers realistic network coexistence and interference scenariosand applies the method to compute the best solution for the given scenario, evaluating frequencychannel interference in terms of Packet Error Rate (PER). Thus, the Matlab tool is used as a deploymentplanning supporting tool and its efficiency is evaluated.

The paper is structured as follows: Section 2 presents a summary of the current interferenceavoidance mechanisms used in standard communication protocols, followed by Section 3 whichincludes the related work for this paper. Section 4 summarizes the metrics used by the method tocharacterize and determine the quality of the available frequency channels. Section 5 introduces thedifferent frequency hopping techniques considered by the method. Section 6 describes the core of themethod and Section 7 presents the evaluation. Finally, Section 8 summarizes and concludes the paperpointing out future steps.

2. Interference Avoidance in Standard Protocols

Within the 2.4 GHz ISM band, different standards have been developed to enable interoperabilitybetween devices. Each of these standards uses a different mechanism for interference avoidance.The well-known and widely used Wireless Local Area Network (WLAN), for instance, adopts theIEEE 802.11 standard [4] which makes use of Direct Sequence Spread Spectrum (DSSS) [5]. In DSSSthe message signal is modulated with a bit sequence known as Pseudo Noise (PN) that consists ofpulses of a much shorter duration (larger bandwidth) than the pulse duration of the message signal.The same PN code is used by the receiver to reconstruct the message signal. The modulation of thesignal makes the resulting signal noisier and, thus, more immune to unintentional or intentionalinterference. WLAN divides the 2.4 GHz ISM band into 11 channels with 22 MHz bandwidth each.Thus, only three channels can be used at the same time avoiding overlapping of the frequency bands.DSSS is not suitable to low-power systems due to the high data rates involved.

Sensors 2018, 18, 657 4 of 34

The IEEE 802.15 standard [6] is the base for Wireless Personal Area Networks (WPAN). Here,the range is smaller than for the WLAN, but the energy consumption is considerably reduced. The firstsub-standard IEEE 802.15.1 is known as Bluetooth [7], which uses Frequency Hopping Spread Spectrum(FHSS) [5]. In FHSS the message signal is transmitted by rapidly switching among many frequencychannels, using a pseudorandom sequence known to both transmitter and receiver. FHSS divides theavailable frequency band into sub-bands or channels, and hops among them in a predetermined order.Bluetooth divides the 2.4 GHz ISM band into 79 channels with 1MHz bandwidth each, and hops fromchannel to channel up to 1600 times per second.

Even if Bluetooth is more energetically efficient than WLAN, it is not suitable for some applicationswhere autonomous operation of battery-powered devices is desirable. The sub-standard for Low-RateWireless Personal Area Networks (LR-WPAN) is IEEE 802.15.4 [8], which divides the spectrum into16 non-overlapping channels (starting from channel 11 to channel 26) with a channel width of 3 MHz.

The manifold benefits of wireless technologies, specially the absence of cables, make WirelessSensor Networks (WSN) attractive for industrial applications as well. However, the adoption ofwireless technologies in industry poses extra challenges, mainly because factory environments aretypically harsh in terms of interferences, noise and physical obstacles. Several industrial organizations,such as ZigBee [9], HART [10] and ISA [11] have been promoting the use the IEEE 802.15.4 standard tointroduce wireless technologies in industrial applications. While ZigBee only utilizes DSSS providedby the IEEE 802.15.4 physical layer, WirelessHART [10] and ISA100 [12] adopt channel hopping andchannel blacklisting to improve the data transmission reliability [13]. In ZigBee, all the transmissionsstay on the same channel unless the entire network decides to hop to another channel.

WirelessHART uses only 15 of the 16 channels defined by the IEEE 802.15.4: channels 11 to 25.Channel 26 is not included as the corresponding frequency is not allowed in some countries [14].Communication among network devices is arbitrated using Time Division Multiple Access (TDMA) [15],which allows for the scheduling of link activity. To enhance reliability, TDMA is combined with channelhopping mechanisms. WirelessHART employs non-adaptive frequency hopping where each link inthe network switches randomly between the 15 available channels. Moreover, channels subject tointerference may be eliminated due to blacklisting, and so, the number of available channels may beless than 15. Transmissions are synchronized in 10 ms timeslots and during each timeslot all availablechannels can be used simultaneously by the various nodes in the network. This allows 15 packets to bepropagated through the network at the same time while minimizing the risk of collisions.

Like WirelessHART, ISA100 uses TDMA along with collision avoidance mechanisms, such asCarrier Sense Multiple Access with Collision Avoidance (CSMA-CA) and Clear Channel Assessment(CCA) [16], resulting in increased data transmission reliability. Before packets are transmitted,the transmitter listens on the channel on which it intends to transmit in order to assess if the channel isclear. If the channel is not clear, the transmitter backs off for a random amount of time, after whichit attempts to retransmit the packet. Devices communicate according to various channel hoppingtechniques, with each subsequent transmission utilizing the next channel defined in the hoppingsequence. Different devices use different offsets in the hopping sequence, resulting in interleavedhopping of devices operating in a wireless subnet. Every data packet needs to be acknowledgedby the receiving device, and unacknowledged packets are retransmitted on a different channel overa different frequency. Hopping techniques include channel blacklisting and adaptive hopping. Channelblacklisting is a centralized decision made by the system manager, while adaptive hopping is a localizeddecision based on statistics of wireless parameters collected by each device. Adaptive hopping allowswireless devices to adapt their hopping sequences based on the quality of communication withspecific neighbours.

3. Related Work

There is a significant amount of literature that contains studies of the performance and coexistenceof the different IEEE standards. The authors in [17], for instance, examine the reliability of a point to

Sensors 2018, 18, 657 5 of 34

point communication with a real IEEE 802.15.4 hardware by measuring the Packet Error Rate (PER)and the Received Signal Strength Indicator (RSSI), both in indoor and outdoor RF environments.The obtained results are used to calibrate the error model in the ns-2 network simulator in order toproduce a more real simulation environment and evaluate the IEEE 802.15.4 network performance ina more reliable way. Furthermore, the coexistence between IEEE 802.15.4 and IEEE 802.11 networks isaddressed, measuring the impact these two wireless technologies have on each other when operatingconcurrently and in range. It is concluded that the IEEE 802.15.4 network operation has practicallyno negative influence on a concurrent IEEE 802.11 communication, but if no care is taken about theoperational channels of the two technologies, the IEEE 802.11 network will have a negative effect onthe performance of the IEEE 802.15.4 network. From the performed measurements, there should beat least 7 MHz offset between the operational frequencies for a satisfactory performance of the IEEE802.15.4 network.

In [1], the coexistence between IEEE 802.11, IEEE 802.15.1 and IEEE 802.15.4 is examined throughmathematical analysis. For different combinations of affected and interfering networks, the PERcaused by cross-technology interference is calculated. This PER is calculated from the Signal to NoiseRatio (SNR) at the affected wireless network receiver, and it is evaluated in terms of distance betweeninterfering and affected networks, packet interval and channel separation. When varying the interfererdistance from the receiver or the packet interval, the transmitter and interferer channels are chosenas follows: IEEE 802.11 on channel 1 (2412 MHz), IEEE 802.15.1 on channel 3 (2410 MHz) and IEEE802.15.4 on channel 12 (2410 MHz), thus constituting co-channel interference. When varying thechannel separation, the interferer channel separation from the transmitter is varied from −15 to15 MHz, thus constituting adjacent channel interference. It is concluded that the IEEE 802.15.1 is moreaffected by IEEE 802.15.4 interference than vice versa. On the other hand, the IEEE 802.15.1 results tobe more resistant than IEEE 802.15.4 against IEEE 802.11 interference.

Nevertheless, these studies do not deepen in interference avoidance mechanisms such as frequencyhopping. Some other work can be found in the literature related to models and simulators of frequencyhopping systems [18–20]. The authors in 18 modelled a frequency hopping wireless communicationsystem based on the Signal Processing Worksystem (SPW) developed by CoWare (acquired by Synosysin 2010) [21]. The designed system is tested in terms of its Bit Error Rate (BER) performance underbroadband and partial-band noise. The interfering noise is generated and modelled as the sum ofa broadband Additive White Gaussian Noise (AWGN) and a multi-tone interference noise, wherethe jammer spreads some interference signals on a number of discrete frequency points. The systemdefines 32 frequency channels, and the frequency hopping pattern is generated according to a certainpseudo-random algorithm.

In [19], a simulator is designed to simulate and evaluate a frequency hopping spread spectrumcommunication systems using VisSim Comm software [22], which is mainly designed to simulateand analyse communication systems. The presented simulator is capable of simulating a completesystem (transmitter, receiver and medium) operating under a noisy environment. The carrierfrequencies for the FHSS system are varied in a pseudorandom manner within a wideband channel.The performance of the communication system is evaluated in terms of BER, and it is concludedthat the FHSS significantly reduces the probability of error of a system operating under narrow bandjamming conditions.

In [20], mathematical modelling is used to simulate and analyse the performance improvementusing frequency hopping spread spectrum with popular modulation techniques using Matlab-Simulink.The baseband signal is combined with a randomly generated carrier frequency. The carrier frequencyis controlled by a Pseudorandom Noise (PN) sequence generator and the signal is transmitted overAWGN. The received data is demodulated using the same PN code, and compared to the originalinput data to calculate the BER.

Theses simulators deal only with frequency hopping systems with pseudorandom frequencysequences, and do not consider adaptive frequency hopping techniques, where the selected

Sensors 2018, 18, 657 6 of 34

frequency channels are adapted to the conditions and characteristics of the environment interferences.The method presented here takes into consideration different hopping techniques and channel qualitymetrics found in the literature. These hopping techniques and metrics are interlaced to analyse differentpossible solutions and obtain the best subset of channels as well as a predetermined hopping sequencefor a given scenario where the network under study has to coexist with unwanted interfering networks.

4. Channel Characterization Metrics

This section describes the different channel characterization metrics taken into consideration inthe analysis. Different quality metrics can be used in order to classify frequency channels based oninterference level. Regardless of the metric used, the method must classify lowly interfered channelsas “good” and highly interfered channels as “bad”. The Received Signal Strength Indicator (RSSI),for instance, measures the RF power level received by an antenna. The channel is characterized byits centre frequency and bandwidth. The higher the RSSI signal, the worse the channel, as it is highlyinterfered by unwanted coexisting systems. RSSI is usually measured in dBm units, that is, the powerratio (P) in decibels (dB) referred to one milliwatt (mW):

P(dBm) = 10· log10P(mW)

1 mW(1)

The RF power level of a radio signal ranges between 0 dBm and −120 dBm. The closer this valueis to −120 dBm, the better, because that means there is little to no interference. Typical lowly interferedenvironments range between −100 dBm and −80 dBm.

Alternatively, frequency channels can be classified using Packet Error Rate (PER), which representsthe rate of non-received to sent frames. A channel is classified as bad if its PER exceeds the systemdefined threshold. Bit Error Rate (BER) can be used in a similar way.

In the following sections we will focus on the RSSI as a channel quality indicator, as themeasurements and calculations involved with RSSI are less complicated, and RSSI values are easilyavailable from the chipsets. However, the work presented here is equally applicable to other indicators(such as PER) with little or no modification. RSSI values must be measured over a specified observationtime for all the available channel frequencies. Figure 2 shows an illustrative example of RSSI signalsover an observation time of 1 s for the 16 channels available in an 802.15.4 network. On purpose, somechannels are affected only by white noise, while others are interfered to a greater or lesser extent bysome coexisting systems.

Sensors 2017, 17, x FOR PEER REVIEW 6 of 33

predetermined hopping sequence for a given scenario where the network under study has to coexist with unwanted interfering networks.

4. Channel Characterization Metrics

This section describes the different channel characterization metrics taken into consideration in the analysis. Different quality metrics can be used in order to classify frequency channels based on interference level. Regardless of the metric used, the method must classify lowly interfered channels as “good” and highly interfered channels as “bad”. The Received Signal Strength Indicator (RSSI), for instance, measures the RF power level received by an antenna. The channel is characterized by its centre frequency and bandwidth. The higher the RSSI signal, the worse the channel, as it is highly interfered by unwanted coexisting systems. RSSI is usually measured in dBm units, that is, the power ratio (P) in decibels (dB) referred to one milliwatt (mW): (dBm) = 10 · log (mW)1 mW (1)

The RF power level of a radio signal ranges between 0 dBm and −120 dBm. The closer this value is to −120 dBm, the better, because that means there is little to no interference. Typical lowly interfered environments range between −100 dBm and −80 dBm.

Alternatively, frequency channels can be classified using Packet Error Rate (PER), which represents the rate of non-received to sent frames. A channel is classified as bad if its PER exceeds the system defined threshold. Bit Error Rate (BER) can be used in a similar way.

In the following sections we will focus on the RSSI as a channel quality indicator, as the measurements and calculations involved with RSSI are less complicated, and RSSI values are easily available from the chipsets. However, the work presented here is equally applicable to other indicators (such as PER) with little or no modification. RSSI values must be measured over a specified observation time for all the available channel frequencies. Figure 2 shows an illustrative example of RSSI signals over an observation time of 1 s for the 16 channels available in an 802.15.4 network. On purpose, some channels are affected only by white noise, while others are interfered to a greater or lesser extent by some coexisting systems.

Figure 2. Example of Received Signal Strength Indicator (RSSI) signal over 1 second for an IEEE 802.15.4 network with 16 channels. The RSSI values lie within −120 dBm and 0 dBm. Higher RSSI values indicate channels interfered to a greater extent, while lower RSSI values indicate channels interfered to a lesser extent.

Figure 2. Example of Received Signal Strength Indicator (RSSI) signal over 1 s for an IEEE 802.15.4network with 16 channels. The RSSI values lie within −120 dBm and 0 dBm. Higher RSSI valuesindicate channels interfered to a greater extent, while lower RSSI values indicate channels interfered toa lesser extent.

Sensors 2018, 18, 657 7 of 34

From RSSI values, different statistical properties can be obtained for channel characterization [23].These statistical properties are calculated over a specified observation time for every availablefrequency channel.

• Mean value (mean): A low mean value of the RSSI signal over the observation time indicateslow RF power in the channel and, thus, a lowly interfered channel. The lower the mean value,the better the channel.

• Standard deviation (std): A high standard deviation indicates a highly interfered channel becauseof the high variability of the RF power. The lower the standard deviation, the better the channel.

• Skewness (skew): The skewness indicates the asymmetry of the RSSI distribution. A symmetricdistribution, which means skewness of around zero, is expected when the RSSI signal is onlyaffected by white noise and no interfering radio transmissions. When multiple RSSI peaks occurdue to radio transmissions, the distribution of the RSSI signal extends to higher values and, thus,a higher value of skewness is expected. The skewness of a signal, x, is calculated by Equation (2),where n is the number of RSSI samples, mean(x) the mean value and std(x) the standard deviationof x.

skew(x) =1n

∑ni=1(xi −mean(x))3

std(x)3 (2)

• x% quantile (quan): The x% quantile of a set of samples describes the cut value which dividesthe statistical distribution so that x% of the samples are below the cut value. A simple way tocalculate the quantile is to sort the RSSI values and find the entry with the index corresponding tothe x% of the vector length. The lower this value, the less peaks occur in the RSSI signal and thelower interference from other radio systems is expected.

• Number of samples over threshold (soth): It is the number of RSSI samples over a specified powerlevel threshold. The lower this value, the less peaks occur in the RSSI signal.

All mentioned properties have in common that lower values indicate less interference and thusbetter channels. These properties must be transformed into a channel gain metric, H, that is directlyproportional to the channel quality, so that it can be directly introduced in the equations presented inSection 5. To do this, a simple linear adjustment is performed:

H = α·x + β (3)

where x is an arbitrary statistical property of the RSSI signal and α and β are parameters to be adjusted.Furthermore, the H metric is normalized between [0, 1], so that the α and β parameters are derived inthe following way:

[min(x), max(x)]→ [1, 0]

1 = α·min(x) + β

0 = α·max(x) + β

}→{

α = 1min(x)−max(x)

β = − max(x)min(x)−max(x)

(4)

Figure 3 shows an illustrative example of this linear projection from the mean value of the RSSIsignal (that ranges from −120 dBm to 0 dBm) to a normalized quality metric. The power metricpresented in Equation (5), Q = |H|2, is also represented.

For the RSSI values in Figure 2, the calculated statistical properties are represented in Figure 4.The derived channel gains are represented in Figure 5.

Sensors 2018, 18, 657 8 of 34Sensors 2017, 17, x FOR PEER REVIEW 8 of 33

Figure 3. Example of linear projection from the mean value of the RSSI signal (blue) to a normalized channel gain, H (red). The dashed red line represents the power metric, Q, derived from the channel gain.

Figure 4. Different statistical properties obtained from the RSSI values in Figure 2: (a) Mean value; (b) Standard deviation; (c) Skewness; (d) 50% quantile; (e) SOTH with −70 dBm threshold.

Figure 3. Example of linear projection from the mean value of the RSSI signal (blue) to a normalizedchannel gain, H (red). The dashed red line represents the power metric, Q, derived from thechannel gain.

Sensors 2017, 17, x FOR PEER REVIEW 8 of 33

Figure 3. Example of linear projection from the mean value of the RSSI signal (blue) to a normalized channel gain, H (red). The dashed red line represents the power metric, Q, derived from the channel gain.

Figure 4. Different statistical properties obtained from the RSSI values in Figure 2: (a) Mean value; (b) Standard deviation; (c) Skewness; (d) 50% quantile; (e) SOTH with −70 dBm threshold.

Figure 4. Different statistical properties obtained from the RSSI values in Figure 2: (a) Mean value;(b) Standard deviation; (c) Skewness; (d) 50% quantile; (e) SOTH with −70 dBm threshold.

Sensors 2018, 18, 657 9 of 34Sensors 2017, 17, x FOR PEER REVIEW 9 of 33

Figure 5. Normalized channel gains from RSSI statistical properties of Figure 4.

It can be observed that most of the statistical properties result in similar channel gains for the considered RSSI signal. This does not stand for the skewness metric, which suggests that channels 2, 6, 10 and 14 are worse than channels 4, 8 and 12, for instance. Even if channels 2, 6, 10 and 14 have higher interfering power peaks, they also have more continued traffic, resulting in a more symmetric skewness function and, thus, lower skew values. Therefore, the skewness metric would be a better indicator of channel quality when dealing with dynamic interferences that vary a lot in time, while the others would be better when dealing with static interferences that hold in time.

So, one of the open questions will be to find the most appropriate metric for a reliable channel quality indicator. Even more, for some metrics, some parameters will have to be adapted for each specific application (the cut value and the power threshold for the x% quantile and SOTH respectively). One of the main objectives of the proposed method is to automatically decide the best RSSI property for each specific scenario.

5. Frequency Hopping Techniques

This section describes the different frequency hopping techniques taken into consideration in the analysis. Hopping techniques determine not only the subset of channels, but also the way these channels are scheduled. Frequency hopping techniques can be classified as either channel-ignorant or channel-aware [24]. With channel-ignorant frequency hopping techniques, the hopping pattern is selected regardless of the channel characteristics, whereas with channel-aware frequency hopping techniques, the hopping pattern is selected after determining the channel characteristics. Channel-aware hopping techniques can be further classified as reduced-hop-set and probabilistic-channel-usage techniques [24–26]. Algorithms based on reduced hop sets totally avoid bad channels. On the other hand, algorithms based on probabilistic channel usage use all channels, although bad channels are assigned a smaller usage probability that depends on environmental conditions. Figure 6 summarizes the frequency hopping technique types. These techniques are explained in more detail in the following subsections.

Gai

n

Figure 5. Normalized channel gains from RSSI statistical properties of Figure 4.

It can be observed that most of the statistical properties result in similar channel gains for theconsidered RSSI signal. This does not stand for the skewness metric, which suggests that channels 2,6, 10 and 14 are worse than channels 4, 8 and 12, for instance. Even if channels 2, 6, 10 and 14 havehigher interfering power peaks, they also have more continued traffic, resulting in a more symmetricskewness function and, thus, lower skew values. Therefore, the skewness metric would be a betterindicator of channel quality when dealing with dynamic interferences that vary a lot in time, while theothers would be better when dealing with static interferences that hold in time.

So, one of the open questions will be to find the most appropriate metric for a reliable channelquality indicator. Even more, for some metrics, some parameters will have to be adapted for eachspecific application (the cut value and the power threshold for the x% quantile and SOTH respectively).One of the main objectives of the proposed method is to automatically decide the best RSSI propertyfor each specific scenario.

5. Frequency Hopping Techniques

This section describes the different frequency hopping techniques taken into considerationin the analysis. Hopping techniques determine not only the subset of channels, but also theway these channels are scheduled. Frequency hopping techniques can be classified as eitherchannel-ignorant or channel-aware [24]. With channel-ignorant frequency hopping techniques,the hopping pattern is selected regardless of the channel characteristics, whereas with channel-awarefrequency hopping techniques, the hopping pattern is selected after determining the channelcharacteristics. Channel-aware hopping techniques can be further classified as reduced-hop-set andprobabilistic-channel-usage techniques [24–26]. Algorithms based on reduced hop sets totally avoidbad channels. On the other hand, algorithms based on probabilistic channel usage use all channels,although bad channels are assigned a smaller usage probability that depends on environmentalconditions. Figure 6 summarizes the frequency hopping technique types. These techniques areexplained in more detail in the following subsections.

Sensors 2018, 18, 657 10 of 34

Sensors 2017, 17, x FOR PEER REVIEW 10 of 33

Figure 6. Classification of frequency hopping techniques.

5.1. Channel-Ignorant Techniques

Random Frequency Hopping

In Random Frequency Hopping (RFH) [27], the available frequency band is divided into narrow sub-bands, and transmission is carried out by transmitting short bursts of data on one sub-band at a time, hopping from sub-band to sub-band in a pseudo-random way.

With channel ignorant techniques such as RFH, over a sufficiently large amount of time, all sub-bands will be used a roughly equal number of times, and so, transmission over bad sub-bands is inevitable. This will cause system performance degradation resulting in high packet error rates. To solve this problem, channel-aware frequency hopping techniques are proposed, where the hopping pattern is selected after determining the channel characteristics. Channel-aware or adaptive frequency hopping algorithms are able to provide better throughput against static interferences, dynamic interferences or both static and dynamic interferences, but they might be more vulnerable to jamming attacks as they decrease the frequency diversity.

5.2. Channel-Aware, Reduced-Hop-Set Techniques

Frequency hopping techniques based on reduced hop sets select channels from the available channels, and hop among them in a pseudo-random manner.

5.2.1. Highest Gain Frequency Hopping

The most obvious example of the reduced-hop-set techniques is the Highest Gain Frequency Hopping (HGFH), where the selected channels are the ones with highest gain.

5.2.2. Matched Frequency Hopping

Channels with high gains tend to be adjacent to each other, and so, it might be easier for a jammer to jam adjacent frequency channels. The Matched Frequency Hopping (MFH) not only selects channels with high gains, but also tries to select channels with dispersed frequencies [28]. In this technique, the main parameter used to select the channels is the set of channel gains, , from which the power metrics, , are calculated: = | | (5)

To select channels with high gains and reasonably well-spaced frequencies, a normalized power metric, , and a cumulative metric, , are defined:

Figure 6. Classification of frequency hopping techniques.

5.1. Channel-Ignorant Techniques

Random Frequency Hopping

In Random Frequency Hopping (RFH) [27], the available frequency band is divided into K narrowsub-bands, and transmission is carried out by transmitting short bursts of data on one sub-band ata time, hopping from sub-band to sub-band in a pseudo-random way.

With channel ignorant techniques such as RFH, over a sufficiently large amount of time,all sub-bands will be used a roughly equal number of times, and so, transmission over bad sub-bandsis inevitable. This will cause system performance degradation resulting in high packet error rates.To solve this problem, channel-aware frequency hopping techniques are proposed, where the hoppingpattern is selected after determining the channel characteristics. Channel-aware or adaptive frequencyhopping algorithms are able to provide better throughput against static interferences, dynamicinterferences or both static and dynamic interferences, but they might be more vulnerable to jammingattacks as they decrease the frequency diversity.

5.2. Channel-Aware, Reduced-Hop-Set Techniques

Frequency hopping techniques based on reduced hop sets select M channels from the available Kchannels, and hop among them in a pseudo-random manner.

5.2.1. Highest Gain Frequency Hopping

The most obvious example of the reduced-hop-set techniques is the Highest Gain FrequencyHopping (HGFH), where the selected M channels are the ones with highest gain.

5.2.2. Matched Frequency Hopping

Channels with high gains tend to be adjacent to each other, and so, it might be easier for a jammerto jam adjacent frequency channels. The Matched Frequency Hopping (MFH) not only selects channelswith high gains, but also tries to select channels with dispersed frequencies [28]. In this technique,the main parameter used to select the M channels is the set of channel gains, Hk, from which the powermetrics, Qk, are calculated:

Qk = |Hk|2 (5)

Sensors 2018, 18, 657 11 of 34

To select channels with high gains and reasonably well-spaced frequencies, a normalized powermetric, Bk, and a cumulative metric, Ck, are defined:

Bk =Qk

∑Ki=1 Qi

k ∈ {1, 2, . . . , K} (6)

Ck =k

∑i=1

Bi (7)

The cumulative metric will always be a monotonically increasing function of k. This metric isused with the M equally spaced values over [0, 1) given by

ym =1M

(m− 1

2

)m ∈ {1, 2, . . . , M} (8)

to determine the indices of the selected channels. The index of the mth channel is given by the value ofk such that

Ck−1 ≤ ym < Ck (9)

Figure 7 illustrates how M = 10 channels are selected among K = 100 available channels usingthis method. For the considered metric, using the highest gain technique would result in selecting thefirst five and last five channels, while only attending to channel separation would result in equallyspaced channels. The MFH algorithm tends to select channels with high gains while avoiding selectingclusters of adjacent channels.

Sensors 2017, 17, x FOR PEER REVIEW 11 of 33

= ∑ ∈ 1,2, … , (6) = (7)

The cumulative metric will always be a monotonically increasing function of . This metric is used with the equally spaced values over [0, 1) given by = − ∈ 1,2, … , (8)

to determine the indices of the selected channels. The index of the mth channel is given by the value of such that ≤ < (9)

Figure 7 illustrates how = 10 channels are selected among = 100 available channels using this method. For the considered metric, using the highest gain technique would result in selecting the first five and last five channels, while only attending to channel separation would result in equally spaced channels. The MFH algorithm tends to select channels with high gains while avoiding selecting clusters of adjacent channels.

Figure 7. Channel selection for Matched Frequency Hopping (MFH) technique. The red line represents the channel gain and the blue line represents the cumulative sum of the power metric. The selected channels are represented as vertical black lines. The best channels are selected from the intersections between the cumulative metric and the equally spaced horizontal lines.

5.2.3. Clipped Matched Frequency Hopping

The Clipped Matched Frequency Hopping (CMFH) is an evolution of the MFH technique [29]. The channel gains are first clipped at a certain threshold, proportional to the maximum gain, and then, the clipped channel gains are decreased by this threshold. That means any channel gain less than or equal to the threshold, max (| | ), is set to zero. The power metrics, , are redefined so that = | | − max(| | ), | | > max(| | )0, | | ≤ max(| | ) (10)

The MFH technique is then applied to the new clipped power metrics, instead of using directly | | as it is done in the MFH technique. The CMFH technique will result in a hopping set with more concentrated channels than in the MFH technique, but with higher gains.

Figure 7. Channel selection for Matched Frequency Hopping (MFH) technique. The red line representsthe channel gain and the blue line represents the cumulative sum of the power metric. The selectedchannels are represented as vertical black lines. The best channels are selected from the intersectionsbetween the cumulative metric and the equally spaced horizontal lines.

5.2.3. Clipped Matched Frequency Hopping

The Clipped Matched Frequency Hopping (CMFH) is an evolution of the MFH technique [29].The channel gains are first clipped at a certain threshold, proportional to the maximum gain, and then,the clipped channel gains are decreased by this threshold. That means any channel gain less than orequal to the threshold, ξmax(|Hk|2), is set to zero. The power metrics, Qk, are redefined so that

Qk =

{|Hk|2 − ξmax(|Hk|2), |Hk|2 > ξmax(|Hk|2)0, |Hk|2 ≤ ξmax(|Hk|2)

(10)

Sensors 2018, 18, 657 12 of 34

The MFH technique is then applied to the new clipped power metrics, instead of using directly|Hk|2 as it is done in the MFH technique. The CMFH technique will result in a hopping set with moreconcentrated channels than in the MFH technique, but with higher gains.

5.2.4. Advanced Frequency Hopping

The Advanced Frequency Hopping (AFH) technique further improves the performance of theMFH technique by selecting more channels with higher gains [30]. The modified power metrics aregiven by

Qk =|Hk|2

(1 + α)max(|Hk|2

)− |Hk|2

(11)

where α is a small scaling factor that can be adjusted to obtain different responses. The MFH techniqueis then applied to the new power metric.

Figure 8 illustrates the channel selection for the HGFH, MFH, CMFH and AFH techniques. In allthe cases M = 10 channels have been selected. It can be seen how the MFH technique selects moredispersed channels compared to the HGFH. The CMFH and AFH techniques modify the powermetric to cluster the channel selection around the highest gain channels but still preserving certainchannel separation.

Figures 9 and 10 illustrate the evolution of the channel selection in the CMFH and AFH techniqueswhen varying the ξ and α parameters. When increasing the threshold in the CMFH technique, theselected channels tend to concentrate around the highest gain channels, as more bad channels arediscarded. The same happens when decreasing the α parameter in the AFH technique.

Sensors 2017, 17, x FOR PEER REVIEW 12 of 33

5.2.4. Advanced Frequency Hopping

The Advanced Frequency Hopping (AFH) technique further improves the performance of the MFH technique by selecting more channels with higher gains [30]. The modified power metrics are given by = | |(1 + ) (| | ) − | | (11)

where is a small scaling factor that can be adjusted to obtain different responses. The MFH technique is then applied to the new power metric.

Figure 8 illustrates the channel selection for the HGFH, MFH, CMFH and AFH techniques. In all the cases = 10 channels have been selected. It can be seen how the MFH technique selects more dispersed channels compared to the HGFH. The CMFH and AFH techniques modify the power metric to cluster the channel selection around the highest gain channels but still preserving certain channel separation.

Figure 8. Comparison of channel selection between different frequency hopping techniques: (a) Highest Gain Frequency Hopping (HGFH); (b) Matched Frequency Hopping (MFH); (c) Clipped Matched Frequency Hopping (CMFH) with = 0.1; (d) Advanced Frequency Hopping (AFH) with = 0.1. The selected channels are represented as vertical black lines. HGFH directly uses the channel gain (red) to select the best channels, while MFH, CMFH and AFH use the cumulative metrics (blue) obtained from the power metrics (green) and their intersections with the equally spaced horizontal lines.

0 10 20 30 40 50 60 70 80 90 100Channel index

(a)

0

0.5

1HGFH

Channel gainSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(b)

0

0.5

1MFH

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(c)

0

0.5

1CMFH ( = 0.1)

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(d)

0

0.5

1AFH ( = 0.1)

Power metricCummulative metricSelected channels

Figure 8. Cont.

Sensors 2018, 18, 657 13 of 34

Sensors 2017, 17, x FOR PEER REVIEW 12 of 33

5.2.4. Advanced Frequency Hopping

The Advanced Frequency Hopping (AFH) technique further improves the performance of the MFH technique by selecting more channels with higher gains [30]. The modified power metrics are given by = | |(1 + ) (| | ) − | | (11)

where is a small scaling factor that can be adjusted to obtain different responses. The MFH technique is then applied to the new power metric.

Figure 8 illustrates the channel selection for the HGFH, MFH, CMFH and AFH techniques. In all the cases = 10 channels have been selected. It can be seen how the MFH technique selects more dispersed channels compared to the HGFH. The CMFH and AFH techniques modify the power metric to cluster the channel selection around the highest gain channels but still preserving certain channel separation.

Figure 8. Comparison of channel selection between different frequency hopping techniques: (a) Highest Gain Frequency Hopping (HGFH); (b) Matched Frequency Hopping (MFH); (c) Clipped Matched Frequency Hopping (CMFH) with = 0.1; (d) Advanced Frequency Hopping (AFH) with = 0.1. The selected channels are represented as vertical black lines. HGFH directly uses the channel gain (red) to select the best channels, while MFH, CMFH and AFH use the cumulative metrics (blue) obtained from the power metrics (green) and their intersections with the equally spaced horizontal lines.

0 10 20 30 40 50 60 70 80 90 100Channel index

(a)

0

0.5

1HGFH

Channel gainSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(b)

0

0.5

1MFH

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(c)

0

0.5

1CMFH ( = 0.1)

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(d)

0

0.5

1AFH ( = 0.1)

Power metricCummulative metricSelected channels

Figure 8. Comparison of channel selection between different frequency hopping techniques: (a) HighestGain Frequency Hopping (HGFH); (b) Matched Frequency Hopping (MFH); (c) Clipped MatchedFrequency Hopping (CMFH) with ξ = 0.1; (d) Advanced Frequency Hopping (AFH) with α = 0.1.The selected channels are represented as vertical black lines. HGFH directly uses the channel gain (red)to select the best channels, while MFH, CMFH and AFH use the cumulative metrics (blue) obtainedfrom the power metrics (green) and their intersections with the equally spaced horizontal lines.

Sensors 2017, 17, x FOR PEER REVIEW 13 of 33

Figure 9 and Figure 10 illustrate the evolution of the channel selection in the CMFH and AFH techniques when varying the and parameters. When increasing the threshold in the CMFH technique, the selected channels tend to concentrate around the highest gain channels, as more bad channels are discarded. The same happens when decreasing the parameter in the AFH technique.

Figure 9. Channel selection evolution in the Clipped Matched Frequency Hopping (CMFH) technique when varying the threshold parameter: (a) = 0.1; (b) = 0.3; (c) = 0.5.

0 10 20 30 40 50 60 70 80 90 100Channel index

(a)

0

0.2

0.4

0.6

0.8

1CMFH ( = 0.1)

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(b)

0

0.2

0.4

0.6

0.8

1CMFH ( = 0.3)

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(c)

0

0.2

0.4

0.6

0.8

1CMFH ( = 0.5)

Power metricCummulative metricSelected channels

Figure 9. Channel selection evolution in the Clipped Matched Frequency Hopping (CMFH) techniquewhen varying the threshold parameter: (a) ξ = 0.1; (b) ξ = 0.3; (c) ξ = 0.5.

Sensors 2018, 18, 657 14 of 34Sensors 2017, 17, x FOR PEER REVIEW 14 of 33

Figure 10. Channel selection evolution in the Advanced Frequency Hopping (AFH) technique when varying the α parameter: (a) = 1; (b) = 0.1; (c) = 0.01.

5.3. Channel Aware, Probabilistic-Channel-Usage Techniques

Unlike the reduced-hop-set techniques, probabilistic-channel-usage techniques use all the available channels, but channels marked as good are used with higher probability.

5.3.1. Weighted Random Frequency Hopping

In the Weighted Random Frequency Hopping (WRFH) technique, the hopping set contains all of the channels, just like with the standard RFH, but when deciding the hopping sequence, a non-uniform probability distribution is used so that channels with higher gains are more likely to be selected [24]. The probability, , of selecting channel is given by = | |∑ | | ∈ 1,2, … , (12)

where is the same channel gain introduced in Equation (5). This equation is analogous to the normalized power metric in the MFH technique (Equation (6)). For each hop, the selection of the channel is carried out by a cumulative metric, , as it is done with the MFH technique: = (13)

The index of the nth channel is given by the value of such that

0 10 20 30 40 50 60 70 80 90 100Channel index

(a)

0

0.2

0.4

0.6

0.8

1AFH ( = 1)

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(b)

0

0.2

0.4

0.6

0.8

1AFH ( = 0.1)

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(c)

0

0.2

0.4

0.6

0.8

1AFH ( = 0.01)

Power metricCummulative metricSelected channels

Figure 10. Channel selection evolution in the Advanced Frequency Hopping (AFH) technique whenvarying the α parameter: (a) α = 1; (b) α = 0.1; (c) α = 0.01.

5.3. Channel Aware, Probabilistic-Channel-Usage Techniques

Unlike the reduced-hop-set techniques, probabilistic-channel-usage techniques use all theavailable channels, but channels marked as good are used with higher probability.

5.3.1. Weighted Random Frequency Hopping

In the Weighted Random Frequency Hopping (WRFH) technique, the hopping set containsall of the K channels, just like with the standard RFH, but when deciding the hopping sequence,a non-uniform probability distribution is used so that channels with higher gains are more likely to beselected [24]. The probability, Pk, of selecting channel k is given by

Pk =|Hk|2

∑Ki=1|Hi|2

k ∈ {1, 2, . . . , K} (12)

where Hk is the same channel gain introduced in Equation (5). This equation is analogous to thenormalized power metric in the MFH technique (Equation (6)). For each hop, the selection of thechannel is carried out by a cumulative metric, Ck, as it is done with the MFH technique:

Ck =k

∑i=1

Pi (13)

Sensors 2018, 18, 657 15 of 34

The index of the nth channel is given by the value of k such that

Ck−1 ≤ yn < Ck n ∈ {1, 2, . . . , K} (14)

where yn is a pseudo-random number over [0,1). This is the main difference with the MFH technique,as the corresponding ym numbers in the MFH were M equally spaced values over [0,1). So, in theWRFH technique, all the channels can be selected with more or less probability, while in the MFHtechnique, there were only M selected channels that would be used with equal probability.

Figure 11 illustrates the differences between the RFH, MFH and WRFH techniques. As an example,20 frequency hops have been considered for the three hopping techniques. In the case of the randomand weighted random techniques, this results in 20 different channels, whereas in the MFH technique,some or all of the selected 10 best channels have to be repeated. Because of its random behaviour, theRFH technique selects some channels with a very low gain. This is partially avoided by the WRFHas the cumulative metric around the lowest gain channels is hardly increased and is less likely to beintercepted by the horizontal lines representing the yn random values. However, as the number ofchannel hops approaches infinite, it would be inevitable to hop over the channels with the least gain,which does not happen with the MFH technique.

Sensors 2017, 17, x FOR PEER REVIEW 15 of 33

≤ < ∈ 1,2, … , (14)

where is a pseudo-random number over [0,1). This is the main difference with the MFH technique, as the corresponding numbers in the MFH were equally spaced values over [0,1). So, in the WRFH technique, all the channels can be selected with more or less probability, while in the MFH technique, there were only selected channels that would be used with equal probability.

Figure 11 illustrates the differences between the RFH, MFH and WRFH techniques. As an example, 20 frequency hops have been considered for the three hopping techniques. In the case of the random and weighted random techniques, this results in 20 different channels, whereas in the MFH technique, some or all of the selected 10 best channels have to be repeated. Because of its random behaviour, the RFH technique selects some channels with a very low gain. This is partially avoided by the WRFH as the cumulative metric around the lowest gain channels is hardly increased and is less likely to be intercepted by the horizontal lines representing the random values. However, as the number of channel hops approaches infinite, it would be inevitable to hop over the channels with the least gain, which does not happen with the MFH technique.

Figure 11. Comparison of channel selection between different frequency hopping techniques: (a) Random Frequency Hopping (RFH); (b) Matched Frequency Hopping (MFH); (c) Weighted Random Frequency Hopping (WRFH). In the RFH and MFH cases, horizontal lines are equally spaced while in the WRFH case, horizontal lines are randomly spaced.

5.3.2. Utility Based Adaptive Frequency Hopping

0 10 20 30 40 50 60 70 80 90 100Channel index

(a)

0

0.2

0.4

0.6

0.8

1RFH

Channel gainSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(b)

0

0.2

0.4

0.6

0.8

1MFH

Power metricCummulative metricSelected channels

0 10 20 30 40 50 60 70 80 90 100Channel index

(c)

0

0.2

0.4

0.6

0.8

1WRFH

Power metricCummulative metricSelected channels

Figure 11. Comparison of channel selection between different frequency hopping techniques:(a) Random Frequency Hopping (RFH); (b) Matched Frequency Hopping (MFH); (c) Weighted RandomFrequency Hopping (WRFH). In the RFH and MFH cases, horizontal lines are equally spaced while inthe WRFH case, horizontal lines are randomly spaced.

Sensors 2018, 18, 657 16 of 34

5.3.2. Utility Based Adaptive Frequency Hopping

The Utility Based Adaptive Frequency Hopping (UBAFH) technique extends the performance ofthe WRFH by introducing a parameter, α, which is called temperature [31]:

Pk =Qα

k

∑Ki=1 Qα

i(15)

The parameter α can be adjusted to achieve different behaviours. Low temperatures will resultin almost even channel usage, while for high temperature values, only the best channels will beused. When α = 1, the probability distribution happens to be the same as for the WRFH technique.Additionally, lower and upper bounds on the usage probability can be introduced so that

Pmin ≤ Pk ≤ Pmin (16)

Pmin is introduced to ensure a minimum degree of frequency diversity, while Pmax prevents thealgorithm from converging to scenarios where only a few channels are used.

5.3.3. Smooth Adaptive Frequency Hopping

Smooth Adaptive Frequency Hopping (SAFH) assigns usage probabilities to all channels based onan exponential smoothing filter for the quality metric to estimate and predict the channel conditions [32].The algorithm uses exponential smoothing to predict the quality metric of the next time step.The predicted power metrics are referred as Q′k, while the measured power metric is referred toas Qk. The predicted power metric at time (t + 1) is calculated by using the predicted metric at timet plus an adjustment for the error that occurred in the last forecast (measured power metric minuspredicted power metric):

Q′k(t + 1) = Q′k(t) + α·(Qk(t)−Q′k(t)

)(17){

Q′k(t + 1) = α·Qk(t) + (1− α)·Q′k(t)Q′k(1) = Qk(0)→ (initial condition)

(18)

The balance between new and old data is controlled by the smoothing factor α in the rangebetween [0,1]. When α approaches 1, the filter gives more weight to recent data and has less ofa smoothing effect. When α approaches 0, the effect of current observation is ignored and only thesmoothed past is retained. By recurrent substitution,

Q′k(t + 1) = α·[

t−1

∑j=0

(1− α)j

]·Qk(t− j) + (1− α)t·Qk(0) (19)

In exponential smoothing, all previous measurements contribute to the smoothed value, but theircontribution is suppressed by increasing powers of the parameter α. The mapping from the metric, Q,to the probability function, P, is subject to two conditions:

1. The probability assigned to a channel is an increasing function of its quality metric:

Q′i(t + 1) ≤ Q′j(t + 1)→ Pi(t + 1) ≤ Pj(t + 1) (20)

This condition results in good channels being used more often than bad channels.2. The target average metric, Q′(t + 1), must be above a certain threshold ξ:

K

∑i=1

Pi(t + 1)·Q′i(t + 1) ≥ ξ (21)

Sensors 2018, 18, 657 17 of 34

This condition results in robustness of the link between the nodes.

The following mapping function fulfils the above conditions:{Pk = (β + c·dk)/δ i f dk ≥ 0Pk = (β + s·dk)/δ i f dk ≤ 0

(22)

where the term dk is the difference between the predicted metric and the threshold ξ:

dk = Q′k − ξ (23)

A positive dk value indicates a good channel and a negative value indicates a bad channel.The term c determines how good channels are rewarded, while the term s determines how badchannels are punished. The larger the c parameter, the more often good channels are used, and thelarger the s parameter, the less often bad channels are used. The term δ is a normalizing factorthat ensures ∑ Pi = 1:

δ =Kg

∑i=1

(β + c·di) +Kb

∑i=1

(β + s·di) (24)

where Kg and Kb are the number of good and bad channels respectively. The term β is chosenso that the condition ∑K

i=1 Pi(t + 1)·Q′k(t + 1) = ξ is fulfilled. The case when c = s = 1 and β = ξ

results in

Pk =Q′kδ

=Q′k

∑Ki=1 Q′i

(25)

which represents the WRFH probability function.

As an illustrative example, let us consider a four-channel problem with Q: {0.84, 0.8, 0.82, 0.86}.Table 1 shows the channel usage probabilities for the WRFH, UBAFH and SAFH techniques forthe specified parameter values. Same results are represented in Figure 12. It can be observed howincreasing the temperature parameter in the UBAFH technique penalizes the usage of the worstchannels in favour of the best ones. The same happens when increasing the c parameter in theSAFH technique.

Table 1. Comparison of channel usage for Weighted Random Frequency Hopping (WRFH),Utility Based Adaptive Frequency Hopping (UBAFH) and Smooth Adaptive Frequency Hopping(SAFH) techniques.

WRFH UBAFH SAFH

Pk = Qk

∑Ki=1 Qi

Pk = Qffk

∑Ki=1 Qff

iξ = 0.85 ξ = 0.85

α = 1 α = 1

ff = 10 ff = 100 c = 10 c = 100s = 1 s = 1

Q1 0.84 P1 0.253 0.273 0.086 0.197 0.100Q2 0.8 P2 0.241 0.168 0.001 0.027 0.075Q3 0.82 P3 0.247 0.214 0.008 0.111 0.088Q4 0.86 P4 0.259 0.345 0.906 0.665 0.737

Sensors 2018, 18, 657 18 of 34

Sensors 2017, 17, x FOR PEER REVIEW 17 of 33

the larger the parameter, the less often bad channels are used. The term is a normalizing factor that ensures ∑ = 1: = ( + · ) + ( + · ) (24)

where and are the number of good and bad channels respectively. The term is chosen so that the condition ∑ ( + 1) · ( + 1) = is fulfilled. The case when = = 1 and = results in = = ∑ (25)

which represents the WRFH probability function.

As an illustrative example, let us consider a four-channel problem with : 0.84, 0.8, 0.82, 0.86 . Table 1 shows the channel usage probabilities for the WRFH, UBAFH and SAFH techniques for the specified parameter values. Same results are represented in Figure 12. It can be observed how increasing the temperature parameter in the UBAFH technique penalizes the usage of the worst channels in favour of the best ones. The same happens when increasing the parameter in the SAFH technique.

Table 1. Comparison of channel usage for Weighted Random Frequency Hopping (WRFH), Utility Based Adaptive Frequency Hopping (UBAFH) and Smooth Adaptive Frequency Hopping (SAFH) techniques.

WRFH UBAFH SAFH

= ∑ = ∑

= .= = == . = = = = =

0.84 0.253 0.273 0.086 0.197 0.100 0.8 0.241 0.168 0.001 0.027 0.075 0.82 0.247 0.214 0.008 0.111 0.088 0.86 0.259 0.345 0.906 0.665 0.737

Figure 12. Comparison of channel usage between different frequency hopping techniques: (a) WRFH; (b) UBAFH with = 10; (c) UBAFH with = 100; (d) SAFH with = 10; (e) SAFH with = 100.

6. Method Description

This section describes the method that analyses the quality of the links between nodes in a Wireless Sensor Network (WSN) in the presence of other coexisting networks. In Section 4 we introduced some metrics that can be used to characterize and determine the quality of the available frequency channels. In Section 5 we described different frequency hopping techniques which select a subset of channels and define a hopping sequence, avoiding channels with lower quality metrics to a greater or a lesser extent depending on the hopping technique. These quality metrics and hopping

Figure 12. Comparison of channel usage between different frequency hopping techniques: (a) WRFH;(b) UBAFH with α = 10; (c) UBAFH with α = 100; (d) SAFH with c = 10; (e) SAFH with c = 100.

6. Method Description

This section describes the method that analyses the quality of the links between nodes in a WirelessSensor Network (WSN) in the presence of other coexisting networks. In Section 4 we introducedsome metrics that can be used to characterize and determine the quality of the available frequencychannels. In Section 5 we described different frequency hopping techniques which select a subset ofchannels and define a hopping sequence, avoiding channels with lower quality metrics to a greater ora lesser extent depending on the hopping technique. These quality metrics and hopping techniquesare interlaced and compared to find the best subset of channels and hopping sequence that result ina minimum number of interferences, improving network throughput, reliability and resilience againstsecurity attacks.

The proposed method can be divided in the following steps:

1. Evaluation of the interfering environment.2. Frequency channel selection.3. Packet Error Rate (PER) calculation.4. Determination of the topology.

In the first step, the interfering environment is evaluated by determining the noise coming fromcoexisting networks. The interfering noise is evaluated at every point of interest, that is, at everylocation of the nodes of the WSN under study. Over a specified observation time, the RSSI values aremeasured for each of the centre frequencies of the available channels in the WSN of interest. Fromthis RSSI values, all the quality metrics of Section 4 are calculated. Figure 2 showed an example ofRSSI measurements for an observation time of 1 s and for the 16 channels available in a IEEE 802.15.4network, from which the statistical properties of Figure 4 were calculated.

In the next step, frequency channel selection, the optimal subset of channels is calculated foreach of the available quality metrics of Section 4 and hopping techniques of Section 5. The qualitymetrics are normalized according to Equations (3) and (4) to obtain a normalized channel gain, H,that can be used for every hopping technique of Section 5. The result will be a nxm matrix containinga subset of channels for each combination of quality metric and hopping technique, n being the numberof employed quality metrics and m the number of employed hopping techniques. Along with thesubset of channels, the hopping sequence is also calculated, that is, the frequency to be used everytime the system hops from one channel to another. The obtained hopping sequence will be usedby the WSN of interest for a specified operation time. Figure 13 shows the observation time duringwhich the interfering environment is evaluated and the operation time during which the WSN ofinterest operates. An example of channel occupancy for WLAN, LR-WPAN and Bluetooth networks isalso represented. WLAN and LR-WPAN networks stay in static channels with 22 MHz and 3 MHz

Sensors 2018, 18, 657 19 of 34

bandwidth respectively. In order to simplify the example, the Bluetooth network hops over only threechannels with 1 MHz bandwidth.

Sensors 2017, 17, x FOR PEER REVIEW 18 of 33

techniques are interlaced and compared to find the best subset of channels and hopping sequence that result in a minimum number of interferences, improving network throughput, reliability and resilience against security attacks.

The proposed method can be divided in the following steps:

1. Evaluation of the interfering environment. 2. Frequency channel selection. 3. Packet Error Rate (PER) calculation. 4. Determination of the topology.

In the first step, the interfering environment is evaluated by determining the noise coming from coexisting networks. The interfering noise is evaluated at every point of interest, that is, at every location of the nodes of the WSN under study. Over a specified observation time, the RSSI values are measured for each of the centre frequencies of the available channels in the WSN of interest. From this RSSI values, all the quality metrics of Section 4 are calculated. Figure 2 showed an example of RSSI measurements for an observation time of 1 s and for the 16 channels available in a IEEE 802.15.4 network, from which the statistical properties of Figure 4 were calculated.

In the next step, frequency channel selection, the optimal subset of channels is calculated for each of the available quality metrics of Section 4 and hopping techniques of Section 5. The quality metrics are normalized according to Equations (3) and (4) to obtain a normalized channel gain, H, that can be used for every hopping technique of Section 5. The result will be a nxm matrix containing a subset of channels for each combination of quality metric and hopping technique, n being the number of employed quality metrics and m the number of employed hopping techniques. Along with the subset of channels, the hopping sequence is also calculated, that is, the frequency to be used every time the system hops from one channel to another. The obtained hopping sequence will be used by the WSN of interest for a specified operation time. Figure 13 shows the observation time during which the interfering environment is evaluated and the operation time during which the WSN of interest operates. An example of channel occupancy for WLAN, LR-WPAN and Bluetooth networks is also represented. WLAN and LR-WPAN networks stay in static channels with 22 MHz and 3 MHz bandwidth respectively. In order to simplify the example, the Bluetooth network hops over only three channels with 1 MHz bandwidth.

Figure 13. Representation of observation (blue) and operation (purple) times and example of channel occupancy with two static networks (WLAN and LR-WPAN) and a dynamic network (Bluetooth) that hops over three frequency channels. The coexisting networks will be analysed during the observation time to determine the operation of the network of interest during the operation time.

Figure 13. Representation of observation (blue) and operation (purple) times and example of channeloccupancy with two static networks (WLAN and LR-WPAN) and a dynamic network (Bluetooth) thathops over three frequency channels. The coexisting networks will be analysed during the observationtime to determine the operation of the network of interest during the operation time.

Once the interfering environment is evaluated and the best frequency sequence is determined,the Packet Error Rate (PER) is calculated for every possible bidirectional connection between nodesof the WSN of interest. For an error to occur in the communication between two nodes, the signalof interest and the interfering noise must coexist in time and frequency, and the Signal to NoiseRatio (SNR) must be higher than the receiving sensitivity. The propagation of the signal of interest ismodelled according to the free-space path loss model:

Pd = P0·(

4πd fc

)(26)

where Po is the transmission power, f the signal frequency, c the speed of light and Pd the receivedpower at distance d.

The overlapping of the signal of interest and the interference noise can be seen in Figure 14.The signal of interest (between two specific nodes) is represented in green, starting after the observationtime and hopping from channel to channel within the operation time. All the contributions fromdifferent coexisting networks to the interference noise are represented in red, and the overlaps betweensignal and noise are represented in black.

Sensors 2018, 18, 657 20 of 34

Sensors 2017, 17, x FOR PEER REVIEW 19 of 33

Once the interfering environment is evaluated and the best frequency sequence is determined, the Packet Error Rate (PER) is calculated for every possible bidirectional connection between nodes of the WSN of interest. For an error to occur in the communication between two nodes, the signal of interest and the interfering noise must coexist in time and frequency, and the Signal to Noise Ratio (SNR) must be higher than the receiving sensitivity. The propagation of the signal of interest is modelled according to the free-space path loss model: = · 4

(26)

where is the transmission power, the signal frequency, the speed of light and the received power at distance .

The overlapping of the signal of interest and the interference noise can be seen in Figure 14. The signal of interest (between two specific nodes) is represented in green, starting after the observation time and hopping from channel to channel within the operation time. All the contributions from different coexisting networks to the interference noise are represented in red, and the overlaps between signal and noise are represented in black.

Figure 14. Signal (green) and noise (red) overlapping. There are different sources that contribute to noise: static networks and dynamic networks that hop over different frequencies. The noise is analysed during the observation time (blue) to determine the hopping sequence of the signal of interest. The signal of interest is only transmitted during the operation time (purple). The overlapping of signal and noise is represented in black. This overlap only implies time and frequency coexistence; for an error to occur, the SNR must be higher than the receiving sensitivity of the nodes too.

In the last step, determination of the topology, the topology of the WSN can be determined taking into consideration the distances between nodes and the resulting overall PER. Figure 15 shows two types of topologies where each node communicates directly to the gateway (single-hop topology) or through other nodes (multi-hop topology). When a node communicates to the gateway through other nodes, the PERs of all the transmissions are multiplied to obtain the overall PER.

In terms of energy consumption, it might be preferable to hop among different nodes, so that the communication distances are reduced and the transmission power of the nodes can be lowered. In return, this may involve increasing the overall PER. On the contrary, to minimize the overall PER, it is most likely that each node has to communicate directly to the gateway, but in exchange for increasing the transmission distances and the consequent power consumption. Assigning different weights to the overall PER and the maximum transmission distance may result in different topologies, and will help to choose the topology with the best equilibrium between overall PER and energy consumption.

Figure 14. Signal (green) and noise (red) overlapping. There are different sources that contributeto noise: static networks and dynamic networks that hop over different frequencies. The noise isanalysed during the observation time (blue) to determine the hopping sequence of the signal of interest.The signal of interest is only transmitted during the operation time (purple). The overlapping of signaland noise is represented in black. This overlap only implies time and frequency coexistence; for an errorto occur, the SNR must be higher than the receiving sensitivity of the nodes too.

In the last step, determination of the topology, the topology of the WSN can be determined takinginto consideration the distances between nodes and the resulting overall PER. Figure 15 shows twotypes of topologies where each node communicates directly to the gateway (single-hop topology) orthrough other nodes (multi-hop topology). When a node communicates to the gateway through othernodes, the PERs of all the transmissions are multiplied to obtain the overall PER.

In terms of energy consumption, it might be preferable to hop among different nodes, so thatthe communication distances are reduced and the transmission power of the nodes can be lowered.In return, this may involve increasing the overall PER. On the contrary, to minimize the overall PER, it ismost likely that each node has to communicate directly to the gateway, but in exchange for increasingthe transmission distances and the consequent power consumption. Assigning different weights to theoverall PER and the maximum transmission distance may result in different topologies, and will helpto choose the topology with the best equilibrium between overall PER and energy consumption.

Sensors 2017, 17, x FOR PEER REVIEW 20 of 33

Figure 15. Different network topologies: (a) Single-hop: each node (black dots) communicates directly to the gateway (red dot); (b) Multi-hop: the nodes communicate to the gateway hopping through other nodes.

7. Evaluation

The evaluation of the presented method is performed beginning with a simulated interfering environment. It has been done so to have an illustrative interfering noise, coming from both static and dynamic (frequency changing) networks, and with significant RSSI values. Even though the same analysis could have been done starting from real RSSI measurements of any specific scenario.

To help in the evaluation of the method, a simulation tool has been developed using Matlab. The developed tool allows to define the interfering environment, deploy the network under study and graphically visualize the results of the calculations. Figure 16 shows the main window of the developed simulation tool.

Figure 16. Main interface of the simulation tool. The left panels contain buttons to configure the analysis parameters and select the different plotting options. The right panel is reserved for the graphical representation of the results. The different type of results are represented in their corresponding tab within the graph panel.

Figure 15. Different network topologies: (a) Single-hop: each node (black dots) communicates directlyto the gateway (red dot); (b) Multi-hop: the nodes communicate to the gateway hopping throughother nodes.

Sensors 2018, 18, 657 21 of 34

7. Evaluation

The evaluation of the presented method is performed beginning with a simulated interferingenvironment. It has been done so to have an illustrative interfering noise, coming from both static anddynamic (frequency changing) networks, and with significant RSSI values. Even though the sameanalysis could have been done starting from real RSSI measurements of any specific scenario.

To help in the evaluation of the method, a simulation tool has been developed using Matlab.The developed tool allows to define the interfering environment, deploy the network under studyand graphically visualize the results of the calculations. Figure 16 shows the main window of thedeveloped simulation tool.

Sensors 2017, 17, x FOR PEER REVIEW 20 of 33

Figure 15. Different network topologies: (a) Single-hop: each node (black dots) communicates directly to the gateway (red dot); (b) Multi-hop: the nodes communicate to the gateway hopping through other nodes.

7. Evaluation

The evaluation of the presented method is performed beginning with a simulated interfering environment. It has been done so to have an illustrative interfering noise, coming from both static and dynamic (frequency changing) networks, and with significant RSSI values. Even though the same analysis could have been done starting from real RSSI measurements of any specific scenario.

To help in the evaluation of the method, a simulation tool has been developed using Matlab. The developed tool allows to define the interfering environment, deploy the network under study and graphically visualize the results of the calculations. Figure 16 shows the main window of the developed simulation tool.

Figure 16. Main interface of the simulation tool. The left panels contain buttons to configure the analysis parameters and select the different plotting options. The right panel is reserved for the graphical representation of the results. The different type of results are represented in their corresponding tab within the graph panel.

Figure 16. Main interface of the simulation tool. The left panels contain buttons to configure the analysisparameters and select the different plotting options. The right panel is reserved for the graphicalrepresentation of the results. The different type of results are represented in their corresponding tabwithin the graph panel.

The interfering environment is simulated by placing potential coexisting networks close to thenetwork of interest. The simulation tool allows to choose between different standards: IEEE 802.11,IEEE 802.15.1 and IEEE 802.15.4. As an illustrative example, let us consider the deployment of an IEEE802.15.4 network as represented in Figure 17, consisting of four sensor nodes (black dots) that haveto communicate with a gateway (G). The network has to coexist with one IEEE 802.11 (WLAN), twoIEEE 802.15.4 (LR-WPAN A and LR-WPAN B) and one IEEE 802.15.1 (Bluetooth) networks (colouredmarkers) located close to the gateway. Our IEEE 802.15.4 network has the ability to hop among theavailable 16 channels.

Sensors 2018, 18, 657 22 of 34

Sensors 2017, 17, x FOR PEER REVIEW 21 of 33

The interfering environment is simulated by placing potential coexisting networks close to the network of interest. The simulation tool allows to choose between different standards: IEEE 802.11, IEEE 802.15.1 and IEEE 802.15.4. As an illustrative example, let us consider the deployment of an IEEE 802.15.4 network as represented in Figure 17, consisting of four sensor nodes (black dots) that have to communicate with a gateway (G). The network has to coexist with one IEEE 802.11 (WLAN), two IEEE 802.15.4 (LR-WPAN A and LR-WPAN B) and one IEEE 802.15.1 (Bluetooth) networks (coloured markers) located close to the gateway. Our IEEE 802.15.4 network has the ability to hop among the available 16 channels.

Figure 17. Example of an 802.15.4 network deployment with four nodes (black dots) and a gateway (G). The gateway is surrounded by four interfering networks (coloured markers).

From the transmission power of each interfering network, the interference noise is calculated at every location of the nodes of the network under study. The signal propagation is modelled according to the free-space path loss (Equation (26)). The transmission powers of the interfering networks are shown in Table 2, along with the transmission power and the receiving sensitivity of the network of interest.

Table 2. Transmission powers and receiving sensitivities for the interfering networks and the wireless sensor network under study.

INTERFERENCE WSN

WLAN Bluetooth LR-WPAN A LR-WPAN B 802.15.4TRANSMISSION POWER 100 mW 2.5 mW 1 mW 1 mW 1 mW RECEIVING SENSITIVITY - - - - −90 dBm

Figure 17. Example of an 802.15.4 network deployment with four nodes (black dots) and a gateway(G). The gateway is surrounded by four interfering networks (coloured markers).

From the transmission power of each interfering network, the interference noise is calculated atevery location of the nodes of the network under study. The signal propagation is modelled accordingto the free-space path loss (Equation (26)). The transmission powers of the interfering networks areshown in Table 2, along with the transmission power and the receiving sensitivity of the networkof interest.

Table 2. Transmission powers and receiving sensitivities for the interfering networks and the wirelesssensor network under study.

INTERFERENCE WSN

WLAN Bluetooth LR-WPAN A LR-WPAN B 802.15.4

TRANSMISSION POWER 100 mW 2.5 mW 1 mW 1 mW 1 mWRECEIVING SENSITIVITY - - - - −90 dBm

The developed tool allows to configure the observation and operation times, as well as thehopping time and the slot times of each network. For the reduced hop set techniques, the numberof channels to employ must be defined as well. Table 3 summarizes the time parameters employedin the evaluation example. The interference noise is observed for 0.1 s and, then, the connections ofthe network of interest are evaluated for an operation time of 0.9 s. Therefore, the total analysis timeresults in 1 s, with a time resolution (time step) of 1 ms. The slot and wait times of all the networksare set to the same values: 3 ms and 2 ms respectively. For the WSN of interest and the interferingBluetooth network, the hop times are set to 5 ms, meaning that every 5 ms these networks hop fromone frequency channel to another.

Sensors 2018, 18, 657 23 of 34

Table 3. Time parameters employed in the analysis.

OBSERVATIONTIME 0.1 s

OPERATIONTIME 0.9 s

ANALYSISTIME 1 s

TIME STEP 1 ms

INTERFERENCE WSN

WLAN Bluetooth LR_WPAN A LR_WPAN B 802.15.4

SLOT TIME 3 ms 3 ms 3 ms 3 ms 3 msWAIT TIME 2 ms 2 ms 2 ms 2 ms 2 msHOP TIME - 5 ms - - 5 ms

The IEEE 802.11 (WLAN) and the interfering IEEE 802.15.4 (LR-WPAN A and LR-WPAN B)networks transmit in static frequency channels, while the IEEE 802.15.1 (Bluetooth) network hops fromfrequency to frequency in a random way. For simplicity, a reduced set of seven channels have beenselected from the available 79 of the Bluetooth network. Figure 18 shows the occupancy of the 2.4 GHzbandwidth over time and the amplitude of the interference noise as received by the gateway.

Sensors 2017, 17, x FOR PEER REVIEW 22 of 33

The developed tool allows to configure the observation and operation times, as well as the hopping time and the slot times of each network. For the reduced hop set techniques, the number of channels to employ must be defined as well. Table 3 summarizes the time parameters employed in the evaluation example. The interference noise is observed for 0.1 s and, then, the connections of the network of interest are evaluated for an operation time of 0.9 s. Therefore, the total analysis time results in 1 s, with a time resolution (time step) of 1 ms. The slot and wait times of all the networks are set to the same values: 3 ms and 2 ms respectively. For the WSN of interest and the interfering Bluetooth network, the hop times are set to 5 ms, meaning that every 5 ms these networks hop from one frequency channel to another.

Table 3. Time parameters employed in the analysis.

OBSERVATION TIME 0.1 s OPERATION TIME 0.9 s ANALYSIS TIME 1 s

TIME STEP 1 ms INTERFERENCE WSN WLAN Bluetooth LR_WPAN A LR_WPAN B 802.15.4

SLOT TIME 3 ms 3 ms 3 ms 3 ms 3 ms WAIT TIME 2 ms 2 ms 2 ms 2 ms 2 ms HOP TIME - 5 ms - - 5 ms

The IEEE 802.11 (WLAN) and the interfering IEEE 802.15.4 (LR-WPAN A and LR-WPAN B) networks transmit in static frequency channels, while the IEEE 802.15.1 (Bluetooth) network hops from frequency to frequency in a random way. For simplicity, a reduced set of seven channels have been selected from the available 79 of the Bluetooth network. Figure 18 shows the occupancy of the 2.4 GHz bandwidth over time and the amplitude of the interference noise as received by the gateway.

Figure 18. Interference noise at the gateway location: (a) Frequency pattern. The WLAN network transmits in the 6th channel of the 802.11 standard, centred at 2437 MHz with a bandwidth of 22 MHz (red). The LR-WPAN A network transmits in the 4th channel of the 802.15.4 standard, centred at 2420 MHz with a bandwidth of 3 MHz (yellow). The LR-WPAN B network transmits in the 13th channel, centred at 2465 MHz (green). The Bluetooth network transmits over seven frequency channels with a bandwidth of 1 MHz each, hopping from channel to channel in a random way (blue); (b) Signal strength. The signal strength of each interfering network at the gateway position is calculated according to the free-space path loss model. The four interfering networks are at the same distance from the gateway, but have different signal strengths as they have different transmission powers.

Figure 18. Interference noise at the gateway location: (a) Frequency pattern. The WLAN networktransmits in the 6th channel of the 802.11 standard, centred at 2437 MHz with a bandwidth of 22 MHz(red). The LR-WPAN A network transmits in the 4th channel of the 802.15.4 standard, centred at2420 MHz with a bandwidth of 3 MHz (yellow). The LR-WPAN B network transmits in the 13thchannel, centred at 2465 MHz (green). The Bluetooth network transmits over seven frequency channelswith a bandwidth of 1 MHz each, hopping from channel to channel in a random way (blue); (b) Signalstrength. The signal strength of each interfering network at the gateway position is calculated accordingto the free-space path loss model. The four interfering networks are at the same distance from thegateway, but have different signal strengths as they have different transmission powers.

Figure 19 represents the channel selection for different metrics and hopping techniques. In orderto simplify the visualization, only four hopping techniques (HGFH, WRFH, AFH and SAFH) andtwo metrics (mean value and standard deviation of RSSI) have been represented, but the analysis hasbeen done for all the eight hopping techniques in Section 5 and all the five metrics in Section 4, as willbe summarized at the end of this section. The configuration parameters of some of the metrics andhopping techniques (when needed), are presented in Table 4.

Sensors 2018, 18, 657 24 of 34

For the reduced-hop-set techniques (HGFH and AFH), M = 10 channels have been selected.The HGFH technique selects the 10 best channels directly from the channel gain, while the AFHtechnique selects the 10 best channels from the cumulative sum of the modified power metric(Equation (11)). With HGFH, both the mean and standard deviation metrics result in the same subsetof channels, whereas with AFH, the resulting subset of channels are slightly different. The WRFH andthe SAFH use all the available channels, but the best channels are used more often than the worst ones.The channel quality is determined from the cumulative metric: the higher the slope of the cumulativemetric, the higher the probability for the corresponding channel to be selected.

The resulting hopping sequence is represented in Figure 20. The interference noise from allthe interfering networks is represented in red and the signal of interest is represented in green.The overlapping of the interference noise and signal is represented in black, but as we have mentionedbefore, aside from the overlapping, the signal to noise ratio has to be higher than the receivingsensitivity for the communications to fail. The bad channel avoidance is best observed here. The HGFH,for instance, totally avoids the 22 MHz band of the WLAN network. However, it does not manage toavoid the 3 MHz bands of the LR-WPAN A (channel 4) and LR_WPAN B (channel 13) networks whenchoosing 10 channels. The AFH tries to avoid the occupied channels while maintaining certain level offrequency dispersion and, thus, the WLAN is not always avoided. WRFH and SAFH do not avoid anyof the occupied channels, but channels within the 22 MHz band of the WLAN network are used lessoften than good channels.

Table 4. Configuration parameters for quality metrics and hopping techniques.

QUALITY METRIC PARAMETERS

QUANTILE SOTH95% th = −60 dBm

HOPPING TECHNIQUE PARAMETERS

CMFH AFH UBAFH SAFH

ξ = 0.1 α = 0.5 α = 2

ξ = 0.85α = 1c = 10s = 1

The amplitude gains of the signal of interest and noise are represented in Figure 21 for the specificconnection between the first node and the gateway. The noise corresponds to the signal strength ofall the contributing interference networks received at the gateway position, and the signal of interestcorresponds to the signal strength received at the gateway coming only from the first node. For theconsidered transmission powers, if signal and noise overlap in time and frequency, the communicationwill fail as the strength of the signal of interest is lower than the noise at the gateway. The frequencypattern of Figure 20 will be the same for all the nodes in the network, but the amplitude of thedifferent signals will depend on the distance between the nodes and between the nodes and theinterfering networks.

Sensors 2018, 18, 657 25 of 34Sensors 2017, 17, x FOR PEER REVIEW 24 of 33

Figure 19. Channel selection. HGFH technique directly uses the channel gain (red) to select the 10 best channels. WRFH, AFH and SAFH techniques use the cumulative metric (blue) derived from the power metric (green) to select the best channels. In all the case, the selected channels are represented as vertical black lines.

Figure 19. Channel selection. HGFH technique directly uses the channel gain (red) to select the 10 best channels. WRFH, AFH and SAFH techniques use thecumulative metric (blue) derived from the power metric (green) to select the best channels. In all the case, the selected channels are represented as vertical black lines.

Sensors 2018, 18, 657 26 of 34Sensors 2017, 17, x FOR PEER REVIEW 25 of 33

Figure 20. Frequency pattern of signal and noise for different hopping techniques and quality metrics. The interfering noise is represented in red and the signal of interest in green. The same noise pattern is considered for all the hopping techniques and all the quality metrics. Different hopping techniques and different quality metrics result in different frequency patterns for the signal of interest. The overlapping of the noise and signal of interest is represented in black.

Figure 20. Frequency pattern of signal and noise for different hopping techniques and quality metrics. The interfering noise is represented in red and the signal ofinterest in green. The same noise pattern is considered for all the hopping techniques and all the quality metrics. Different hopping techniques and different qualitymetrics result in different frequency patterns for the signal of interest. The overlapping of the noise and signal of interest is represented in black.

Sensors 2018, 18, 657 27 of 34Sensors 2017, 17, x FOR PEER REVIEW 26 of 33

Figure 21. Strength of signal and noise for different hopping techniques and quality metrics. The interfering noise is represented in red and the signal of interest in green. The noise is the sum of all the interfering networks as received at the gateway. The signal of interest is the signal strength received at the gateway coming from the first node.

Figure 21. Strength of signal and noise for different hopping techniques and quality metrics. The interfering noise is represented in red and the signal of interest ingreen. The noise is the sum of all the interfering networks as received at the gateway. The signal of interest is the signal strength received at the gateway coming fromthe first node.

Sensors 2018, 18, 657 28 of 34

For each possible bidirectional connection between nodes of the network under study, the PER iscalculated from the number of interferences during the operation time. The result will be a matrix foreach quality metric and hopping technique as represented in Figure 22.

Sensors 2017, 17, x FOR PEER REVIEW 27 of 33

For each possible bidirectional connection between nodes of the network under study, the PER is calculated from the number of interferences during the operation time. The result will be a matrix for each quality metric and hopping technique as represented in Figure 22.

Figure 22. Packet Error Rate for all possible node connections for different quality metrics and hopping techniques. Each element contains the Packet Error Rate (PER) value (percentage) for the specified connection. 1 > , for instance, indicates the connection from node 1 to the gateway.

From the PER of each connection, the topology of the network can be determined in terms of overall packet error rate and transmission distances. Figure 23–Figure 25 show the resulting topologies when assigning different weights to the transmission distances and the resulting PER. Only attending to the overall PER results in direct connections between the nodes and the gateway (Figure 23), while minimizing the transmission distances results in multi hop transmissions (Figure 24). In both cases, the same topologies result for all the quality metrics and hopping techniques. When assigning equal weights to the transmission distances and the overall PER, different topologies result for different quality metrics and hopping techniques (Figure 25). With the HGFH, for instance, hopping from node to node in order to minimize the transmission distances does not penalize the overall PER at all, while with the other hopping techniques, the overall PER is considerably increased as the transmission distances are reduced.

Table 5 summarizes the overall PER results for all the quality metrics in Section 4 and all the hopping techniques in Section 5 for equal weights of overall PER and transmission distances. For most of the considered metrics, the RFH results to be the worst hopping technique as we could expect. The WRFH technique significantly improves the performance of the RFH, but is still far from the performance level of the other hopping techniques. Among the other hopping techniques, it cannot be said that a specific technique is much better than the others, and the same happens with the quality metrics. For the considered scenario, the combination of UBAFH technique and 95% quantile metric results to be the best solution with a 9% of overall PER, but different interfering scenarios might result in other quality metrics and hopping techniques being the best. Configuration parameters other than the ones presented in Table 4 could also yield a different solution. Nevertheless, the main objective of the method here presented is not to determine a quality metric and a hopping technique that best fits most of the possible scenarios, but to automatically find the best solution for any specific scenario after analysing all the possible solutions.

Figure 22. Packet Error Rate for all possible node connections for different quality metrics and hoppingtechniques. Each element contains the Packet Error Rate (PER) value (percentage) for the specifiedconnection. 1 > G, for instance, indicates the connection from node 1 to the gateway.

From the PER of each connection, the topology of the network can be determined in terms ofoverall packet error rate and transmission distances. Figures 23–25 show the resulting topologies whenassigning different weights to the transmission distances and the resulting PER. Only attending tothe overall PER results in direct connections between the nodes and the gateway (Figure 23), whileminimizing the transmission distances results in multi hop transmissions (Figure 24). In both cases,the same topologies result for all the quality metrics and hopping techniques. When assigning equalweights to the transmission distances and the overall PER, different topologies result for differentquality metrics and hopping techniques (Figure 25). With the HGFH, for instance, hopping from nodeto node in order to minimize the transmission distances does not penalize the overall PER at all, whilewith the other hopping techniques, the overall PER is considerably increased as the transmissiondistances are reduced.

Table 5 summarizes the overall PER results for all the quality metrics in Section 4 and all thehopping techniques in Section 5 for equal weights of overall PER and transmission distances. For mostof the considered metrics, the RFH results to be the worst hopping technique as we could expect.The WRFH technique significantly improves the performance of the RFH, but is still far from theperformance level of the other hopping techniques. Among the other hopping techniques, it cannot besaid that a specific technique is much better than the others, and the same happens with the qualitymetrics. For the considered scenario, the combination of UBAFH technique and 95% quantile metricresults to be the best solution with a 9% of overall PER, but different interfering scenarios might resultin other quality metrics and hopping techniques being the best. Configuration parameters other thanthe ones presented in Table 4 could also yield a different solution. Nevertheless, the main objective ofthe method here presented is not to determine a quality metric and a hopping technique that best fitsmost of the possible scenarios, but to automatically find the best solution for any specific scenario afteranalysing all the possible solutions.

Sensors 2018, 18, 657 29 of 34Sensors 2017, 17, x FOR PEER REVIEW 28 of 33

Figure 23. Inferred topologies with = 1 and = 0. Minimizing the overall PER results in direct connections between nodes and gateway for all the hopping techniques and quality metrics. Figure 23. Inferred topologies with wPER = 1 and wDIST = 0. Minimizing the overall PER results in direct connections between nodes and gateway for all thehopping techniques and quality metrics.

Sensors 2018, 18, 657 30 of 34Sensors 2017, 17, x FOR PEER REVIEW 29 of 33

Figure 24. Inferred topologies with = 0 and = 1. Minimizing the transmission distances results in multi-hop connections for all the hopping techniques and quality metrics. The overall PER is considerably increased, except for the HGFH technique, which remains the same as with single-hop topology. Figure 24. Inferred topologies with wPER = 0 and wDIST = 1. Minimizing the transmission distances results in multi-hop connections for all the hopping techniquesand quality metrics. The overall PER is considerably increased, except for the HGFH technique, which remains the same as with single-hop topology.

Sensors 2018, 18, 657 31 of 34

Sensors 2017, 17, x FOR PEER REVIEW 30 of 33

Figure 25. Inferred topologies with = 0.5 and = 0.5. Different hopping techniques and different quality metrics result in different topologies.

Figure 25. Inferred topologies with wPER = 0.5 and wDIST = 0.5. Different hopping techniques and different quality metrics result in different topologies.

Sensors 2018, 18, 657 32 of 34

Table 5. Overall PER with wPER = 0.5 and wDIST = 0.5.

HOPPING TECHNIQUES

HGFH RFH WRFH MFH CMFH AFH UBAFH SAFH

qualitymetrics

mean 14% 51% 36% 22% 19% 20% 17% 27%std 18% 52% 42% 48% 49% 23% 24% 29%

skewness 19% 50% 45% 57% 43% 53% 41% 15%95% quantile 18% 42% 19% 23% 19% 19% 9% 24%

soth (−60 dBm) 22% 49% 31% 35% 18% 20% 21% 33%

8. Conclusions

In this paper, we presented a method for selecting the best frequency hopping strategy.The proposed method leverages a set of standard frequency hopping techniques and quality metricsin order to homogenize and normalize them, so they can be fairly compared based on qualityand performance indicators. The main objective of the method is to provide an interferenceavoidance mechanism to reduce the need for retransmissions, minimize energy consumption, avoidthe unnecessary degradation of QoS and reliability as well as protect against interference basedsecurity attacks.

The method has the advantage of dynamically selecting the best channel quality metric and thebest hopping technique taking into account the communication channel quality and environmentinterference conditions. As opposed to static and standalone solutions found in the state of the art,in case of channel interference, the method supports the selection of the best frequency hoppingstrategy to minimize the side effects of an interfered frequency and is able to dynamically adaptto changing conditions. The final result is a subset of frequency channels, as well as a hoppingsequence, that minimizes the interference with coexisting networks and the effects of interferencebased security attacks.

The method is designed to be used in two complementary scenarios: (a) as a deployment planningsupporting tool for the selection of the best frequency channels, channel quality metrics and frequencyhopping techniques given a known interference scenario and (b) as the base for the implementation ofa runtime management component for the dynamic selection of communication frequency channelsunder changing interference conditions.

The method is extensible and easily accommodates additional frequency hopping techniques,quality metrics and performance indicator approaches. Additionally, the method can also be extendedto take into account other characteristics and restrictions of constrained systems (such as processingpower or energy consumption) in order to select the most suitable solution.

A simulation tool has been developed to assist in the validation and implementation of themethod. The simulation tool allows for the definition and simulation of the interfering environment,but the whole analysis is perfectly applicable to real environments. That is, the received signal strengthindicator (or some other channel quality indicator) in a real environment could be measured and usedas input for the method implementation, and the channel selection and the hopping sequence wouldbe obtained from the tool.

It is left for future work to test the implementation of a runtime channel selection component basedon the proposed method and its verification against the simulation tool. For that, a real deploymentwould have to be analysed in terms of received signal strength indicator for the interfering nodes andpacket error rate for node connections in the wireless sensor network under study, and then comparedwith the same simulated scenario. It is also left for future research the inclusion of additional inputparameters to the method to take into account other restrictions of the environment or the system,such as characteristics of constrained systems.

Acknowledgments: Research partially supported by the European Union’s Seventh Framework Programme forresearch, technological development and demonstration under Grant Agreement Number FP7-SEC-2013-1/607292ZONeSEC—Towards a EU framework for the security of Widezones, in the scope of the activities related to

Sensors 2018, 18, 657 33 of 34

develop technologies that foster the Plug, Play&Forget paradigm. Also partially supported by the Department ofEducation, Universities and Research of the Basque Government under Grant IT980-16 and the Spanish ResearchCouncil, under grant TIN2016-79897-P.

Author Contributions: The authors have contributed equally to the work reported.

Conflicts of Interest: The authors declare no conflict of interest.

References

1. Natarajan, R.; Zand, P.; Nabi, M. Analysis of Coexistence between IEEE 802.15.4, BLE and IEEE 802.11 in the2.4 GHz ISM Band. In Proceedings of the 42nd Annual Conference of the IEEE Industrial Electronics Society(IECON), Florence, Italy, 23–26 October 2016.

2. Chen, D.; Varshney, P.K. QoS Support in Wireless Sensor Networks: A Survey. In Proceedings of theInternational Conference on Wireless Networks (ICWN), Las Vegas, NV, USA, 21–24 June 2004.

3. Singh, R.S.; Prasad, A.; Moven, R.M.; Sarma, H.K.D. Denial of Service Attack in Wireless Data Netwok:A Survey. In Proceedings of the Devices for Integrated Circuit (DevIC), Kalyani, India, 23–24 March 2017.

4. IEEE. Sdt 802.11-2012-IEEE Standard for Information Technology—Telecommunications and Information Exchangebetween Systems—Local and Metropolitan Area Networks—Specific Requirements Part 11: Wireless LAN MediumAccess Control (MAC) and Physical (PHY) Specifications; IEEE: San Francisco, CA, USA, 2012.

5. Dixon, R. Spread Spectrum Techniques; John Wiley & Sons: New York, NY, USA, 1977.6. Pahlavan, K.; Krishnamurthy, P. IEEE 802.15 Wireless Personal-Area Network. In Networking Fundamentals:

Wide, Local and Personal Area Communications; John Wiley & Sons: New York, NY, USA, 2009.7. Bluetooth SIG. Bluetooth Specification Version 4.2; Core Version 4.2; Bluetooth SIG: Kirkland, WA, USA, 2014.8. IEEE. IEEE Std 802.15.4-2011-IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate

Wireless Personal Area Networks (LR-WPANs); IEEE: San Francisco, CA, USA, 2011.9. ZigBee Alliance. Available online: http://www.zigbee.org (accessed on 21 February 2018).10. HART Communication. Available online: https://fieldcommgroup.org/technologies/hart (accessed on 21

February 2018).11. ISA. Available online: https://www.isa.org (accessed on 21 February 2018).12. ISA 100 Wireless Compliance Institute. Available online: https://isa100wci.org (accessed on 21 February 2018).13. Eskola, M.; Hikkilä, T. Classification of Radio Channel Disturbances for Industrial Wireless Sensor Networks.

Ad Hoc Netw. 2016, 42, 19–33. [CrossRef]14. Petersen, S.; Carlsen, S. Performance Evaluation of WirelessHART for Factory Automation. In Proceedings

of the IEEE Conference on Emerging Technologies & Factory Automation (ETFA 2009), Mallorca, Spain,22–25 September 2009.

15. Pal, S.K.; Chatterjee, P. A Survey on TDMA-based MAC Protocols for Wireless Sensor Network. Int. J. Emerg.Technol. Adv. Eng. 2014, 4, 219–230.

16. Wong, C.M.; Hsu, W.P. An additional clear channel assessment for IEEE 802.15.4 slotted CSMA/CAnetworks. In Proceedings of the IEEE International Conference on Communications Systems, Singapore,17–19 November 2010; pp. 62–66.

17. Petrova, M.; Riihijärvi, J.; Mähönen, P.; Labella, S. Performance Study of IEEE 802.15.4 Using Measurementsand Simulations. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC),Las Vegas, NV, USA, 3–6 April 2006.

18. Li, Y. Model and Simulation of Slow Frequency Hopping System Using Signal Progressing Worksystem.In International Conference on Information Computing and Applications (ICICA): Communications in Computer andInformation Science; Springer-Verlag: Berlin/Heidelberg, Germany, 2010; Volume 105.

19. Alqaysi, H.J.A. Simulation of Frequency Hopping Spread Spectrum and Jamming in Wireless CommunicationSystems. J. Adv. Sci. Eng. Res. 2013, 3, 400–407.

20. Badiger, R.; Nagaraja, M.; Kurian, M.Z.; Rasheed, I. Analysis, Design and Testing of Frequency HoppingSpread Spectrum Transceiver Model Using Matlab-Simulink. Int. J. Adv. Res. Electr. Electron. Instrum. Eng.2014, 3, 7432–7438.

21. SPW Signal Processing Systems. Available online: https://www.synopsys.com/verification/virtual-prototyping/algorithm-design-analysis/spw.html (accessed on 21 February 2018).

Sensors 2018, 18, 657 34 of 34

22. VisSim Comm Signal Processing and Communication System Design. Available online: http://www.adeptscience.co.uk/products/mathsim/vissim/vissim-comm.html (accessed on 21 February 2018).

23. Berger, A.; Pichler, M.; Ciccarello, D.; Priller, P.; Springer, A. Characterization and Adaptive Selection of RadioChannels for Reliable and Energy-Efficient WSN. In Proceedings of the IEEE Wireless Communications andNetworking Conference (WCNC), Doha, Qatar, 3–6 April 2016.

24. Saad, W.M.; Marsland, I. Weighted Random Frequency Hopping in the Presence of Narrowband Interference.In Proceedings of the 10th International Conference on Electrical Engineering/Electronics, Computer,Telecommunications and Information Technology (ECTI-CON), Krabi, Thailand, 15–17 May 2013.

25. Sughasiny, M.; Dhanapal, R. Interference Avoidance Mechanisms in Bluetooth—A Comparative Study. Int. J.Comput. Appl. 2013, 75, 37–42.

26. D’mello, S.; Aalam, Z. AFH Techniques—Survey Based on Probabilistic Channel Usage. Int. J. Res. Comput.Eng. Electron. 2014, 3, 1–5.

27. Putzke, M.; Wietfeld, C. Self-organizing OFDMA Systems by Random Frequency Hopping. In Proceedingsof the 4th IFIP Wireless Days, Niagara Falls, ON, Canada, 10–12 October 2011.

28. El-Khamy, S.E. Matched Frequency Hopping (MFH) Signals for Slowly Fading Dispersive Channels.IEEE Trans. Veh. Technol. 1998, 47, 365–369. [CrossRef]

29. El-Khamy, S.E.; Abdalla, F.; Al-Hourani, A. An Improved Channel Aware Clipped Matched FrequencyHopping (CMFH) Signaling Technique in Slowly Fading Dispersive Channels. In Proceedings of theTwenty-Second National Radio Science Conference (NRSC 2005), Cairo, Egypt, 15–17 March 2005.

30. El-Khamy, S.E.; Saad, W.M. New Technique for Enhancing the Signaling in Slowly Fading DispersiveChannels. In Proceedings of the 5th International Conference on Wireless Communications, Networkingand Mobile Computing (WiCom), Beijing, China, 24–26 September 2009.

31. Stabellini, L.; Shi, L.; Al Rifai, A.; Espino, J.; Magoula, V. A New Probabilistic Approach for AdaptiveFrequency Hopping. In Proceedings of the 2009 IEEE 20th International Symposium on Personal, Indoorand Mobile Radio Communications, Tokyo, Japan, 13–16 September 2009.

32. Cheikh, S.B.; Esemann, T.; Hellbrück, H. SAFH—Smooth Adaptive Frequency Hopping. In Proceedings ofthe 2011 Third International Workshop on Cross Layer Design (IWCLD), Rennes, France, 30 November–1December 2011.

© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open accessarticle distributed under the terms and conditions of the Creative Commons Attribution(CC BY) license (http://creativecommons.org/licenses/by/4.0/).